Review Questions
Now it's time to check your knowledge. Answer the questions, and then check your answers, which can be found in the Solutions section at the end of the book:
- If you install a freeware program that analyzes your computer and then finds 40,000 exploits and asks you to purchase the full version, what type of attack is this?
- Describe how a fileless virus operates.
- How does an attacker carry out credential harvesting?
- How is pretexting used in an attack?
- How does an invoice scam work?
- How does an attacker carry out password spraying?
- How does an attacker use a malicious USB drive?
- How does artificial intelligence tainting help attackers?
- When you go to a restaurant, how can you protect yourself against card cloning?
- What is an on-path attack?
- Why is operational technology vulnerable to attack?
- Give an example of crypto-malware.
- What type of malware self-replicates and which virus self-propagates itself? ...